Hitachi ID Management Suite Version 3.2 Security Target (EAL2) Version 1.98

Size: px
Start display at page:

Download "Hitachi ID Management Suite Version 3.2 Security Target (EAL2) Version 1.98"

Transcription

1 Hitachi ID Management Suite Version 3.2 Security Target (EAL2) Version Hitachi ID Systems, Inc. All rights reserved.

2 Hitachi ID Systems, Inc. Document name: Version 3.2 Security Target (EAL2) Submitted to: DOMUS IT Security Laboratory Attn: Submitted by: Hitachi ID Systems, Inc. Document date: April 21, 2008 Document path: PRCS:qa/ccc/doc/st-new.tex 2008 Hitachi ID Systems, Inc. All rights reserved. i

3 Revision History Rev. # Description By Date of Issue 1.0 Initial draft Enzo Bertorelli 26-Aug Update SFR list Enzo Bertorelli 31-Aug Update Functional Characteristics Enzo Bertorelli 13-Sep Update Detailed description Enzo Bertorelli 15-Sep Minors updates to all sections as per DOMUS review Enzo Bertorelli 27-Oct Updates to diagrams in section 1. Updates to the SFR descriptions. Updates to correlations section. Enzo Bertorelli 15-Nov Corrections from Hitachi ID feedback Enzo Bertorelli 25-Nov Changes made as result of CSE suggestions Enzo Bertorelli 07-Jan General Revision Luc D. Cousineau 18-Apr Changes to address DOMUS OR 01 Enzo Bertorelli, Luc D. Cousineau 16-Sep Changes to address CB OR 01 Luc D. Cousineau 27-Nov Final Draft Stacey Kaluta 23-June Minor revision to Final Draft Stacey Kaluta 16-Aug Minor revision to Final Draft to address OR8 Stacey Kaluta 14-Feb Updated conventions and terminology Stacey Kaluta 27-Mar Further updates to acronyms and abbreviations Stacey Kaluta 03-Apr Removed confidential information and associated text from control page Stacey Kaluta 04-Apr Rebranding from M-Tech to Hitachi ID Stacey Kaluta 08-APR Hitachi ID Systems, Inc. All rights reserved. ii

4 Table of Contents 1 Introduction Identification Security target overview CC conformance claim TOE Description ID-Synch Primitive operations Core features P-Synch Primitive operations Core features Shared architecture Security Interaction with target systems Web access TOE boundary TOE Security Environment Secure usage assumptions Threats to security Organizational security policies Security Objectives Security objectives for the TOE Security objectives for the IT environment IT Security Requirements Hitachi ID Systems, Inc. All rights reserved. iii

5 5.1 TOE security functional requirements Security audit (FAU) User data protection (FDP) Identification and authentication (FIA) Security management (FMT) Protection of the TOE security functions (FPT) TOE security assurance requirements Configuration management (ACM) Delivery and operation (ADO) Development (ADV) Guidance documents (AGD) Tests (ATE) Vulnerability assessment (AVA) Security requirements for the IT environment Protection of the TOE security functions (FPT) Statement of strength of TOE security function TOE Summary Specification Statement of TOE IT security functions Assurance measures PP Claims 34 8 Rationale Introduction Security objectives rationale Security functional requirements rationale Assurance security requirements rationale Dependencies rationale Hitachi ID Systems, Inc. All rights reserved. iv

6 List of Tables 5-2 Auditable Events Assurance Requirements for EAL Assurance Measures Mapping the TOE Security Environment to Security Objectives Mapping Security Objectives to Security Functional Requirements Mapping TOE IT Security Functions to Security Function Requirements Functional and Assurance Requirements Dependencies Hitachi ID Systems, Inc. All rights reserved. v

7 List of Figures 1 Integration With Target Systems Web access architecture diagram TOE Boundary Hitachi ID Systems, Inc. All rights reserved. vi

8 Conventions and Terminology Through this document, operations performed in Common Criteria requirements are highlighted like this. Acronyms and abbreviations CC CCCS CEM COTS EAL PP SARs SFP SFRs ST TBD TOE TSC TSF TSP Common Criteria Canadian Common Criteria Scheme Common Methodology for Information Technology Security Commercial-Off-The-Shelf Evaluation Assurance Level Protection Profile Security Assurance Requirements Security Function Policy Security Functional Requirements Security Target To Be Determined Target of Evaluation TSF Scope of Control TOE Security Function TOE Security Policy 2008 Hitachi ID Systems, Inc. All rights reserved. 1

9 Document Organization Section 1 provides the introductory material for the Security Target. Section 2 provides general purpose and TOE description. Section 3 provides a discussion of the expected environment for the TOE. This section also defines the set of threats that are to be addressed by either the technical countermeasures implemented in the TOE hardware or software or through the environmental controls. Section 4 defines the security objectives for both the TOE and the TOE environment. Section 5 contains the functional and assurance requirements derived from the Common Criteria Parts 2 and 3, respectively, that must be satisfied by the TOE. Section 6 describes the details specific to the TOE implementation of the security measures described in this document. Section 7 contains the claims of Protection Profile conformance for this Security Target. Section 8 provides a rationale to explicitly demonstrate that the information technology security objectives satisfy the policies and threats. Arguments are provided for the coverage of each policy and threat. The section then explains how the set of requirements are complete relative to the objectives, and that each security objective is addressed by one or more component requirements. Arguments are provided for the coverage of each objective Hitachi ID Systems, Inc. All rights reserved. 2

10 1 Introduction This section identifies the Security Target and Target of Evaluation (TOE) identification, ST conventions, and ST conformance claims. This ST describes a set of security requirements and specifications to be used as the basis for evaluation of an identified Information Technology (IT) product. The IT product described in this ST is the Hitachi ID Management Suite Version 3.2 software, developed by Hitachi ID Systems, Inc. Throughout this document, the TOE will be referred to as the ID Management Suite. The ID Management Suite is composed of 2 components: P-Synch and ID-Synch. The ID Management Suite software components are the subject of the evaluation and are called the Target of Evaluation (TOE). Note: The Hitachi ID Management Suite was previously known as the M-Tech Identity Management Suite. Hitachi ID Systems, Inc. was previously known as M-Tech Information Technology, Inc. M-Tech was acquired by Hitachi, Ltd. In April of Identification Title: Hitachi ID Management Suite Version 3.2 Security Target (EAL2) ST Version: 1.98 TOE Identification: Hitachi ID Management Suite Version 3.2 Authors: Enzo Bertorelli, Luc D. Cousineau, Stacey Kaluta CC Version: 2.2 Keywords: Commercial-off-the-shelf (COTS), identity management, password management, identification, authentication, networked information systems. 1.2 Security target overview Hitachi ID s ID Management Suite is made up of 2 major components: ID-Synch which provides identity management across multiple platforms, both current and legacy. P-Synch which provides automated Enterprise password management on a self serve basis. These can include password synchronization and password reset. This framework provides a uniform password policy throughout the Enterprise and provides strong data encryption. These two components make up the entire TOE for this security Target (ST). Its security characteristics are described below as is the boundary of this evaluation Hitachi ID Systems, Inc. All rights reserved. 3

11 The Common Criteria (CC) Evaluation Assurance Level 2 evaluation documented herein describes the assumptions, threats, security objectives that pertain to the product in its normal use and presents findings that establish its functional properties at that level. This documentation presents the rationale that the evaluation criteria presented are consistent and complete, and that the functional and assurance requirements cited are fulfilled. Throughout this document, we will refer to P-Synch Protected User Record Access Control to refer to the access control policy enforced by the P-Synch component of the ID Management Suite and ID-Synch Protected User Record Access Control to refer to the access control policy enforced by the ID-Synch component of the ID Management Suite. Wherever we refer to Protected User Record Access Control, we will be referring to the combination of the P-Synch protected User Record Access Control and ID-Synch protected User Record Access Control policies. 1.3 CC conformance claim The ID Management Suite is conformant to Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements (Version 2.2, January 2004) Extended (with FAU_ADG.1). All International Common Criteria Interpretations through September, 2004 have been applied. The ID Management Suite is conformant to Common Criteria for Information Technology Security Evaluation Part 3: Security assurance requirements (Version 2.2, January 2004). All International Common Criteria Interpretations through September, 2004 have been applied. The ID Management Suite is being evaluated to Evaluation Assurance Level 2 (EAL2) under the Canadian Common Criteria Scheme (CCCS) using the Common Methodology for Information Technology Security Evaluation, Evaluation methodology, Version 2.2, January All International Common Criteria Interpretations through September, 2004 have been applied Hitachi ID Systems, Inc. All rights reserved. 4

12 2 TOE Description The ID Management Suite is a complete identity management solution enabling organizations to securely organize and manage user identities across enterprise applications and systems. The ID Management Suite combines the power of Hitachi ID s flagship technologies, ID-Synch for user provisioning and P-Synch for password management. The following sections describe the ID Management Suite and its components. 2.1 ID-Synch ID-Synch is a complete user provisioning solution that automates and simplifies the routine tasks of managing users across multiple systems. Enterprise-scale organizations depend on ID-Synch to ensure that their employees and contractors are securely and efficiently connected to vital systems and information. ID-Synch strengthens security by: Providing consolidated reports on user access to systems that can be used to review compliance with security policy Enforcing authorization rules over change requests Implementing standards over the setup of new login IDs Applying access controls to security administrators Providing an audit log of all provisioning / deprovisioning events Primitive operations ID-Synch primitive operations, which create or modify user objects on managed systems, may be any of the following: Create new and delete existing accounts for a user Check enabled / disabled status of existing accounts Set enabled / disabled status of existing accounts Read attributes of existing user accounts Set attributes of existing user accounts Modify the membership of existing accounts in security groups Change the context of a user in a structured directory 2008 Hitachi ID Systems, Inc. All rights reserved. 5

13 2.1.2 Core features ID-Synch core features include: Consolidated user administration Security administrators can log into an ID-Synch web user interface, from which they can: create new accounts; delete, enable, disable, or update existing accounts; and manage the membership of users in security groups and distribution lists. Simplified management of users across systems reduces the workload for security administrators. Self-service user administration workflow Users are empowered to submit requests for new, changed or terminated systems access or to change their personal profile information. For example, a manager may submit a request for new accounts for a new hire or contractors may request additional system access for themselves. Requests are automatically validated, filled out with extra attributes such as login ID or directory OU and routed to the appropriate authorizers. Authorizers are assigned based on the resources requested or the identity of the requester. Authorizers review open requests and may approve or reject them. Approved requests are automatically applied to managed systems by ID-Synch. In many organizations, most of the cost and delay of access management is due to entry, routing and approvals of change requests. ID-Synch streamlines requests with easy input and parallel routing, to significantly reduce the delay between first input of a request and its fulfillment. Rapid access provisioning improves user productivity: new hires no longer spend days or weeks waiting for access before they can start work. Managers spend less time filling in and tracking paper requests. 2.2 P-Synch P-Synch helps organizations manage passwords and other forms of authentication more effectively to reduce IT support costs, increase productivity and enhance corporate security. P-Synch strengthens security by providing: A strong enterprise-wide password policy enforcement facility Effective user authentication, especially for self-service and assisted password resets Password synchronization to help users remember, rather than write down, their passwords The ability to securely delegate the right to reset passwords to front-line support staff Accountability for password resets Encryption of all transmitted passwords 2008 Hitachi ID Systems, Inc. All rights reserved. 6

14 2.2.1 Primitive operations P-Synch primitive operations may be any of the following: Set / reset passwords Clear intruder lockout flags on systems that support intruder lockout Set account enabled status on systems that support enable / disable Update password expiry information Core features P-Synch core features include: Assisted password reset Authorized support analysts can log into a P-Synch web user interface, look up a caller s profile, authenticate the caller by keying in answers to personal questions, and reset one or more passwords. A closed ticket can be automatically written to the call tracking system. Support staff do not require any privileges to systems on which P-Synch allows them to reset passwords. Self-service password reset A user who has forgotten his password or triggered an intruder lockout can log into P-Synch, from his own computers or that of a neighbor, with another form of authentication to perform self-service password reset. Supported authentication factors include answering personal questions in the form of Q&A, using a hardware token (SecurID, SafeWord), using a biometric sample, and smart cards. Automated password reset allows locked out users to reset their own passwords, effectively addressing the problem of forgotten passwords. P-Synch creates a secure and efficient process for users to reset their passwords, thus minimizing the help desk call volume and time spent with the help desk resetting the passwords. Once authenticated, users can reset their own passwords without calling the help desk. Tickets can be automatically created on a call tracking system. Web-based password synchronization Users can synchronize some or all of their passwords by using a P-Synch web interface to make routine password changes. The password policy is clearly stated on the screen and enforced immediately. Each system where the user has a login ID is represented by a name and a check box. Transparent password synchronization When users change their Windows NT, Active Directory, LDAP (Sun, IBM), Unix, OS/390, and OS/400 password, the new password is subjected to a global password policy in addition to the native policy. If the password is acceptable, the new password is changed both on the initial system and, automatically, on every other system where the user has a login ID Hitachi ID Systems, Inc. All rights reserved. 7

15 Password policy enforcement P-Synch enforces a uniform, global policy in addition to the various password policies enforced natively on each managed system. The built-in password policy engine includes over 50 standard rules, plus a regular expression engine and plug-in system, allowing organizations to define new rules. Open-ended password history and dictionary checks are included. 2.3 Shared architecture P-Synch and ID-Synch use the same product architecture for: Security The ID Management Suite offers multi-layered security. This includes running on a hardened OS, using file system ACLs, providing strong application-level user authentication, encrypting sensitive data, enforcing application-level ACLs, and storing log data indefinitely Interaction with target systems The ID Management Suite server interacts with target systems (managed systems) using native communication protocols wherever possible. This minimizes the amount of software that must be installed on managed systems. For those systems where a secure remote administration facility is not available, a combination of server-side software and scripting technologies are used. This is illustrated in Figure 1. Some of the supported target systems include: Active Directory, LDAP directories, Windows NT servers / domains, Novell NDS, Unix (various flavors), OS/400, OS/390, DB2 database, Oracle database, Sybase database, MSSQL database, SAP, PeopleSoft, Exchange, GroupWise, Notes / Domino, Telnet sessions, Windows command-line integration, web forms, web services (SOAP, XML), and SecurID tokens Hitachi ID Systems, Inc. All rights reserved. 8

16 Local Agent: OS/390, Unix, RSA ACE Master, Slave Target System: Remote Agent Proxy Servers Remote Site Physical security P-Synch, ID-Synch Servers TCP/IP bit Crypto Various Protocols Secure Native Protocol System Ticket System HR System, Directory Figure 1: Integration With Target Systems 2008 Hitachi ID Systems, Inc. All rights reserved. 9

17 2.3.3 Web access Most ID Management Suite functions are accessed using a web browser. The ID Management Suite user interface is primarily HTML and works with most web browsers. In particular, since the web interface does not require active content (ActiveX), it works with older browsers, locked down browsers, and through filtering firewalls. Local Agent: OS/390, Unix, RSA ACE Target System: Remote Agent Proxy Servers Remote Site User HTTPS Load Balancer Master, Slave P-Synch, ID-Synch Servers Physical security TCP/IP bit Crypto Various Protocols Secure Native Protocol System Ticket System HR System, Directory Figure 2: Web access architecture diagram For added security, the web server software on the ID Management Suite server can be configured to use HTTPS. To enable encryption between users web browsers and the ID Management Suite interface, an organization purchases (from a certificate authority) or generates its own digital server certificate and installs it for the web site. This is no different from any other secure web application (web banking, e- Commerce) Hitachi ID Systems, Inc. All rights reserved. 10

18 2.4 TOE boundary For the purposes of this security target, the TOE boundary includes Hitachi ID s ID Management Suite software, as well as P-Synch/390 a proprietary started task and security exit to be used as local agent installed on the IBM OS/390 operating system. Note: Although other platforms exist (see subsubsection on Page 8) they are not within the TOE boundary as their interface functions are handled by native methods (APIs or the underlying OS). The following diagram describes the relationships within the TOE: IDM Server Self-service P-Synch self-serve UI (CGIs) Requests Service infrastructure (idauth) ID-Synch self-serve UI (CGIs) P-Synch service (pushpass) Verify/ reset passwords Consolidated administration P-Synch user admin (CGIs) Make updates/ reset passwords Web browsers HTTPS Web server (IIS, Apache, etc) Make updates ID-Synch user admin (CGIs) Remote agent ID-Synch DB service Synchronize passwords Identity cache Hitachi ID encrypted TPC/IP OS/390 Server OS/390 local agent P-Synch/390 started task P-Synch/390 security exit Target of evaluation Scope of Control (TSC) Figure 3: TOE Boundary 2008 Hitachi ID Systems, Inc. All rights reserved. 11

19 Note: The TOE is constituted of the modules within the highlighted (gold) area. The name of the physical processes providing the services is indicated in brackets after the service description. There are no hardware or firmware components within the TOE boundary. 3 TOE Security Environment The TOE security environment consists of the threats to security, organizational security policies, and usage assumptions as they relate to the TOE. The ID Management Suite provides for a level of protection that is appropriate for IT environments that require a harmonized password policy across an enterprise. The software is not designed to withstand physical attacks directed at disabling or bypassing its security features, however it is designed to withstand some logical attacks originating from its attached network. Threats are undesirable events and are characterized in terms of a threat agent, a presumed attack method, vulnerabilities that are the foundation for the attack, and identification of the asset under attack. Threat agents are subjects which have not been granted authorized access to the assets. Assets comprise the TOE and the authentication data held by the TOE on behalf of authorized users. For this evaluation, the threat agents are assumed to have an attack potential of low. As a result, the TOE has been developed with the assumption that a potential attacker would have a proficient level of expertise, access to public knowledge of the TOE, restricted access to the TOE, and have access to standard equipment. 3.1 Secure usage assumptions A.Competent_Admin Competent system administrators System administrators are competent to manage the TOE and the security of the information it contains. The administrators will not compromise the security of the TOE or its data either willfully or by neglect. A.Coop_User Cooperative users Users cooperate with those responsible for managing the TOE to maintain TOE security and will follow all directives and prescriptions imposed by the administrators and / or guidance provided with the TOE. A.Environment Secure Environment The environment is secure and the administrators have a good working knowledge and know how to manage the OS underlying the TOE. A.Network Secure Network Network connected to the TOE is protected from active attacks (i.e. data mode intrusion) Hitachi ID Systems, Inc. All rights reserved. 12

20 A.Physical Physical Security TOE is physically secure. The TOE will be deployed in an environment providing physical security adequate to protect against unauthorized access. A.Ext_Services External Services In cases where external services (e.g. IVR) are used, the services are secure and do not offer unauthorized access to the TOE. A.Back_End_Auth Back End Authentication There is a back-end system handling the authentication of nonadministrative users. A.Time_Source Reliable Time Source The TOE s environment provides a reliable time source for time stamping audit records. A.Reference_Monitor Reference Mediation The TOE s environment provides a properly implemented reference monitor and enforces the domain separation required for the application of the TOE s discretionary access control policy. 3.2 Threats to security T.Disclosure Unauthorized disclosure of user data. An attacker may attempt capture the managed data while it is in transit between remote parts of the TOE. 3.3 Organizational security policies P.Accountability Individual accountability Individuals shall be held accountable for their actions Hitachi ID Systems, Inc. All rights reserved. 13

21 4 Security Objectives 4.1 Security objectives for the TOE O.Audit Auditing Maintain audit records. Provide individual accountability for audited events. Uniquely identify each user so that auditable actions can be traced to a user. O.I&A Identify and authenticate a user to support accountability Provide the basic I&A functions that will support user accountability. O.Secure_Transfer User data is secured from disclosure in transit User data is secured from disclosure in transit between remote parts of the TOE. O.User_Defined_AC User-defined access control Enforce an access control policy whereby company policies determine who may access the data controlled by the TOE. 4.2 Security objectives for the IT environment OE.Audit Audit records with identity The IT environment provides the date and time components of the audit records. OE.AC Environmental access control The IT environment enforces the reference mediation and domain separation required to implement the access controls. OE.Back_End_Auth Back-end Authentication The IT environment provides the back-end authentication services required to authenticate non-administrative users. OE.Competent_Admin Competent system administrators The IT environment ensures that System administrators are competent to manage the TOE and the security of the information it contains and that the administrators will not compromise the security of the TOE or its data either willfully or by neglect. OE.Coop_User Cooperative users 2008 Hitachi ID Systems, Inc. All rights reserved. 14

22 The IT environment ensures that users cooperate with those responsible for managing the TOE to maintain TOE security and will follow all directives and prescriptions imposed by the administrators and / or guidance provided with the TOE. OE.Environment Secure Environment The IT environment must ensure that the TOE is secure and the administrators have a good working knowledge and know how to manage the OS underlying the TOE. OE.Network Secure Network The IT environment must ensure that the network connected to the TOE is protected from active attacks (i.e. data mode intrusion). OE.Physical Physical Security The IT environment must ensure that the TOE is physically secure. OE.Ext_Services External Services In cases where external services (e.g. IVR) are used, the IT environment must ensure that the services are secure and do not offer unauthorized access to the TOE Hitachi ID Systems, Inc. All rights reserved. 15

23 5 IT Security Requirements 5.1 TOE security functional requirements Security audit (FAU) Audit data generation (FAU_ADG.1) The TSF shall be able to generate an audit record of the following auditable event: a) All auditable events for the not specified level of audit; and b) Events listed in Table 5-2. FAU_ADG.1.1 The TSF shall record within each audit record at the following information: a) Date and time of the event, type of event, subject identity, and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the ST, no other audit relevant information. FAU_ADG.1.2 Rationale: FAU_ADG.1.1 and FAU_ ADG.1.2 are necessary to specify audit requirements as performed by the TOE. FAU_SAR.1 has a dependency on FAU_GEN.1. FAU_ADG.1.1 which is an extended security requirement based on FAU_GEN.1, generates the audit record and FAU_ADG.1.2 indicates the information contained within the audit record. The dependency is satisfied because a record has to first be generated before it can be read. The TOE audit function does not record start up and shut down of the audit function so the extended requirement is fulfilling the dependency requirement instead of FAU_GEN.1. Table 5-2 Auditable Events Component FDP_ACF.1 FIA_AFL.1 FIA_SOS.1 FIA_UAU.2 Audited Events All requests to perform an operation on an object covered by the SFP, except special cases where the recording of failure is not required. The identity of the object. The reaching of the threshold for the unsuccessful authentication attempts and the actions taken. The restoration to normal state. Rejection or acceptance by the TSF of any tested secret. All use of the authentication mechanism.... continued on the next page 2008 Hitachi ID Systems, Inc. All rights reserved. 16

24 Table 5-2 continued Component FIA_UID.2 FMT_MSA.1 FMT_MSA.3 FMT_SMR.1 Audited Events All use of the user identification mechanism, including the identity provided during successful attempts. All modifications of the values of security attributes. Modifications of the default setting of permissive or restrictive rules. All modifications of the initial value of security attributes. Modifications to the group of users that are part of a role User identity association (FAU_GEN.2) The TSF shall be able to associate each auditable event with the identity of the user that caused the event. FAU_GEN Audit review (FAU_SAR.1) The TSF shall provide Administrative users who are authorized to read audit records with the capability to read all audit information from the audit records. FAU_SAR.1.1 The TSF shall provide the audit records in a manner suitable for the user to interpret the information. FAU_SAR Restricted audit review (FAU_SAR.2) The TSF shall prohibit all users read access to the audit records, except those users that have been granted explicit read-access. FAU_SAR Selectable audit review (FAU_SAR.3:P-Synch) The TSF shall provide the ability to perform searches of audit data based on account name, event type, and / or date. FAU_SAR Selectable audit review (FAU_SAR.3:ID-Synch) The TSF shall provide the ability to perform searches of audit data based on operation, target system, and / or date. FAU_SAR Hitachi ID Systems, Inc. All rights reserved. 17

25 Protected audit trail storage (FAU_STG.1) The TSF shall protect the stored audit record from unauthorized deletion. FAU_STG.1.1 The TSF shall be able to prevent unauthorized modifications to the stored audit records in the audit trail. FAU_STG User data protection (FDP) Subset access control (FDP_ACC.1) The TSF shall enforce the Protected User Record Access Control on: a) Subjects: administrative users and regular users of the TOE; b) Objects: global password policy, audit data, user objects, and access control groups; c) Operations: modify global password policy, read TOE audit data, manage (create, update, or delete) user objects, manage (create, update, delete) access control groups, and modify administrative users passwords. FDP_ACC Security attribute based access control (FDP_ACF.1:P-Synch) The TSF shall enforce the P-Synch Protected User Record Access Control to objects based on the following: a) The subject attributes: account name, user role, and user rights associated with subjects: administrative users and regular users. b) The following access control attributes associated with the object: Global password policy: password policy rules Audit data: audit data records User objects: account name, user role, user rights, administrative user password, and user profile data. FDP_ACF.1.1:P-Synch The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed: Global password policy: Modification of the global password policy is limited to administrative users with the appropriate right. Audit data: The reading of audit data is limited to administrative users with the appropriate right Hitachi ID Systems, Inc. All rights reserved. 18

26 User objects: The management of administrative user objects is limited to administrative users with the appropriate right. Additionally, an administrative user can only manage administrative user objects that have equal or lesser user rights. An administrative user cannot modify his own user rights. The management of manually added regular user objects is limited to administrative users with the appropriate right. FDP_ACF.1.2:P-Synch Note: Manually added regular users are those added directly to P-Synch by an administrative user. Unlike other regular users, they are not imported from the IT environment. The TSF shall explicitly authorize access of subjects to objects based on the following additional rules: no additional rules. FDP_ACF.1.3:P-Synch The TSF shall explicitly deny access of subjects to objects based on the following additional rules: no additional rules. FDP_ACF.1.4:P-Synch Security attribute based access control (FDP_ACF.1:ID-Synch) The TSF shall enforce the ID-Synch Protected User Record Access Control to objects based on the following: a) The subject attributes: account name, user role, user rights, and access control groups associated with subjects: administrative users and regular users. b) The following access control attributes associated with the object: Global password policy: password policy rules Audit data: audit data records Access control group: group members User objects: account name, user role, user rights, administrative user password, and user profile data. FDP_ACF.1.1:ID-Synch The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed: Global password policy: Modification of the global password policy is limited to administrative users with the appropriate right. Audit data: The reading of audit data is limited to administrative users with the appropriate right. Access control groups: The management of access control groups is limited to administrative users with the appropriate rights Hitachi ID Systems, Inc. All rights reserved. 19

27 User objects: The management of administrative user objects is limited to administrative users with the appropriate right. Additionally, an administrative user can only manage administrative user objects that have equal or lesser rights. An administrative user cannot modify his own user rights. The management of manually added regular user objects is limited to administrative users with the appropriate right. Note: Manually added regular users are those added directly to ID-Synch by an administrative user. Unlike other regular users, they are not imported from the IT environment and are not created with accounts on target systems. The management of regular user objects is provided to administrative users with the appropriate right. FDP_ACF.1.2:ID-Synch The TSF shall explicitly authorize access of subjects to objects based on the following additional rules: no additional rules. FDP_ACF.1.3:ID-Synch The TSF shall explicitly deny access of subjects to objects based on the following additional rules: no additional rules. FDP_ACF.1.4:ID-Synch Identification and authentication (FIA) Authentication failure handling (FIA_AFL.1) The TSF shall detect when an administrator configurable positive integer within 1-99 unsuccessful authentication attempts occur related to the unsuccessful authentication attempts since the last successful authentication for the indicated user. FIA_AFL.1.1 When the defined number of unsuccessful authentication attempts has been met or surpassed, the TSF shall disable the user until unlocked by an administrative user. FIA_AFL.1.2 Note: An administrative user can also set the number of minutes after which a locked-out user will automatically be re-enabled (the lockout duration). By default, this setting is off User attribute definition (FIA_ATD.1:P-Synch) The TSF shall maintain the following list of security attributes belonging to individual users: account name, user role, user rights, and administrative user password. FIA_ATD User attribute definition (FIA_ATD.1:ID-Synch) The TSF shall maintain the following list of security attributes belonging to individual users: account name; user role, user rights, access control group, and administrative user password. FIA_ATD Hitachi ID Systems, Inc. All rights reserved. 20

28 Verification of secrets (FIA_SOS.1) The The TSF shall provide a mechanism to verify that secrets meet SOF-high. FIA_SOS User authentication before any action (FIA_UAU.2:Admin) The TSF shall require each user belonging to an administrative role to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user. FIA_UAU.2.1:Admin Note: Regular users are authenticated using a back-end authentication mechanism Protected authentication feedback (FIA_UAU.7) The TSF shall provide only obscured feedback to the user while the authentication is in progress. FIA_UAU User identification before any action (FIA_UID.2) The TSF shall require each user to identify itself before allowing any other TSF-mediated actions on behalf of that user. FIA_UID User-subject binding (FIA_USB.1:P-Synch) The TSF shall associate the following user security attributes with subjects acting on the behalf of that user: account name, user role, and user rights. FIA_USB.1.1 The TSF shall enforce the following rules on the initial association of user security attributes with subjects acting on the behalf of users: the user session shall represent the user s access rights predetermined by his role and assigned rights. FIA_USB.1.2 The TSF shall enforce the following rules governing changes to the user security attributes associated with subjects acting on the behalf of users: no rules. FIA_USB User-subject binding (FIA_USB.1:ID-Synch) The TSF shall associate the following user security attributes with subjects acting on the behalf of that user: account name, user role, user rights, and access control group. FIA_USB.1.1 The TSF shall enforce the following rules on the initial association of user security attributes with subjects acting on the behalf of users: the user session shall represent the user s access rights predetermined by his role and assigned rights. FIA_USB.1.2 The TSF shall enforce the following rules governing changes to the user security attributes associated with 2008 Hitachi ID Systems, Inc. All rights reserved. 21

29 subjects acting on the behalf of users: no rules. FIA_USB Security management (FMT) Management of security attributes (FMT_MSA.1:P-Synch) The TSF shall enforce the P-Synch Protected User Record Access Control to restrict the ability to modify the security attributes password policy rules to administrative users with the appropriate right. The TSF shall enforce the P-Synch Protected User Record Access Control to restrict the ability to query the security attributes audit data records to administrative users with the appropriate right. The TSF shall enforce the P-Synch Protected User Record Access Control to restrict the ability to modify the security attributes administrative user password to administrative users authorized to modify their own passwords, and administrative users authorized to modify other administrative users passwords. FMT_MSA.1.1 The TSF shall enforce the P-Synch Protected User Record Access Control to restrict the ability to create the security attributes account name to administrative users authorized to do so. FMT_MSA.1.1 The TSF shall enforce the P-Synch Protected User Record Access Control to restrict the ability to modify the security attributes user rights to administrative users authorized to do so. FMT_MSA.1.1 The TSF shall enforce the P-Synch Protected User Record Access Control to restrict the ability to modify the security attributes user profile data to administrative users authorized to do so. FMT_MSA.1.1 The TSF shall enforce the P-Synch Protected User Record Access Control to restrict the ability to assign the security attributes user role to administrative users authorized to do so. FMT_MSA Management of security attributes (FMT_MSA.1:ID-Synch) The TSF shall enforce the ID-Synch Protected User Record Access Control to restrict the ability to modify the security attributes password policy rules to administrative users with the appropriate right. The TSF shall enforce the ID-Synch Protected User Record Access Control to restrict the ability to query the security attributes audit data records to administrative users with the appropriate right. The TSF shall enforce the ID-Synch Protected User Record Access Control to restrict the ability to modify the security attributes administrative user password to administrative users authorized to modify their own passwords, and administrative users authorized to modify other administrative users passwords. FMT_MSA.1.1 The TSF shall enforce the ID-Synch Protected User Record Access Control to restrict the ability to create the security attributes account name to administrative users and regular users authorized to do so. FMT_MSA.1.1 The TSF shall enforce the ID-Synch Protected User Record Access Control to restrict the ability to modify 2008 Hitachi ID Systems, Inc. All rights reserved. 22

30 the security attributes user rights to administrative users authorized to do so. FMT_MSA.1.1 The TSF shall enforce the ID-Synch Protected User Record Access Control to restrict the ability to modify the security attributes user profile data to administrative users authorized to do so. FMT_MSA.1.1 The TSF shall enforce the ID-Synch Protected User Record Access Control to restrict the ability to manage the security attributes group members to administrative users authorized to do so. FMT_MSA.1.1 The TSF shall enforce the ID-Synch Protected User Record Access Control to restrict the ability to assign the security attributes user role to administrative users authorized to do so. FMT_MSA Static attribute initialization (FMT_MSA.3) The TSF shall enforce the Protected User Record Access Control to provide restrictive default values for security attributes that are used to enforce the SFP. FMT_MSA.3.1 The TSF shall allow the administrative users and regular users with the required rights to specify alternative initial values to override the default values when an object or information is created. FMT_MSA Specification of Management Functions (FMT_SMF.1:P-Synch) The TSF shall be capable of performing the following security management functions: modification of the global password policy, management of user objects, modification of administrative user passwords. FMT_SMF Specification of Management Functions (FMT_SMF.1:ID-Synch) The TSF shall be capable of performing the following security management functions: modification of the global password policy, management of user objects and access control groups, modification of administrative user passwords. FMT_SMF Security roles (FMT_SMR.1:P-Synch) The TSF shall maintain the roles super user, help desk user, and regular user. FMT_SMR Security roles (FMT_SMR.1:P-Synch) The TSF shall maintain the roles super user, console user, and regular user. FMT_SMR.1.1 Note: Collectively, super users, help desk users, and console users are referred to as administrative users. The TSF shall be able to associate users with roles. FMT_SMR Hitachi ID Systems, Inc. All rights reserved. 23

31 5.1.5 Protection of the TOE security functions (FPT) Basic internal TSF data transfer protection (FPT_ITT.1) The TSF shall protect TSF data from disclosure when it is transmitted between separate parts of the TOE. FPT_ITT TOE security assurance requirements The Evaluation Assurance Level chosen for this evaluation is 2 (EAL2). EAL2 was chosen to provide a low to moderate level of independently assured security based on availability of the complete development record from the vendor. The chosen assurance level is consistent with the postulated threat environment. EAL2 was chosen to provide: a low to moderate level of assurance that is consistent with good commercial practices. The analysis is supported by independent testing of the TOE security functions, evidence of developer testing based on the functional specification, selective independent confirmation of the developer test results, strength of function analysis, and evidence of a developer search for obvious vulnerabilities (e.g. those in the public domain). EAL2 also provides assurance through a configuration list for the TOE, and evidence of secure delivery procedures. The TOE s permutational and combinatory mechanisms (passwords) will provide strength of function consistent with corporate password requirements in terms character length and numeric / alphabetic content in accordance with FIA_SOS.1 above Hitachi ID Systems, Inc. All rights reserved. 24

32 Table 5-3 Assurance Requirements for EAL2 Assurance Class ACM ADO Assurance Components ACM_CAP.2 ADO_DEL.1 ADO_IGS.1 ADV AGD ADV_FSP.1 ADV_HLD.1 ADV_RCR.1 AGD_ADM.1 AGD_USR.1 ATE AVA ATE_COV.1 ATE_FUN.1 ATE_IND.2 AVA_SOF.1 AVA_VLA Configuration management (ACM) Configuration items (ACM_CAP.2) The developer shall provide a reference for the TOE. ACM_CAP.2.1D The developer shall use a CM system. ACM_CAP.2.2D The developer shall provide CM documentation. ACM_CAP.2.3D The reference for the TOE shall be unique to each version of the TOE. ACM_CAP.2.1C The TOE shall be labelled with its reference. ACM_CAP.2.2C The CM documentation shall include a configuration list. ACM_CAP.2.3C The configuration list shall describe the configuration items that comprise the TOE. ACM_CAP.2.4C The CM documentation shall describe the method used to uniquely identify the configuration items. ACM_CAP.2.5C The CM system shall uniquely identify all configuration items that comprise the TOE. ACM_CAP.2.6C 2008 Hitachi ID Systems, Inc. All rights reserved. 25

33 5.2.2 Delivery and operation (ADO) Delivery procedures (ADO_DEL.1) The developer shall document procedures for delivery of the TOE or parts of it to the user. ADO_DEL.1.1D The developer shall use the delivery procedures. ADO_DEL.1.2D The delivery documentation shall describe all procedures that are necessary to maintain security when distributing versions of the TOE to a user s site. ADO_DEL.1.1C Installation, generation, and start-up procedures (ADO_IGS.1) The developer shall document procedures necessary for the secure installation, generation, and start-up of the TOE. ADO_IGS.1.1D The documentation shall describe the steps necessary for secure installation, generation, and start-up of the TOE. ADO_IGS.1.1C Development (ADV) Informal functional specification (ADV_FSP.1) The developer shall provide a functional specification. ADV_FSP.1.1D The functional specification shall describe the TSF and its external interfaces using an informal style. ADV_FSP.1.1C The functional specification shall be internally consistent. ADV_FSP.1.2C The functional specification shall describe the purpose and method of use of all external TSF interfaces, providing details of effects, exceptions, and error messages, as appropriate. ADV_FSP.1.3C The functional specification shall completely represent the TSF. ADV_FSP.1.4C Descriptive high-level design (ADV_HLD.1) The developer shall provide the high-level design of the TSF. ADV_HLD.1.1D The presentation of the high-level design shall be informal. ADV_HLD.1.1C The high-level design shall be internally consistent. ADV_HLD.1.2C The high-level design shall describe the structure of the TSF in terms of subsystems. ADV_HLD.1.3C The high-level design shall describe the security functionality provided by each subsystem of the TSF. ADV_HLD.1.4C The high-level design shall identify any underlying hardware, firmware, and / or software required by the 2008 Hitachi ID Systems, Inc. All rights reserved. 26

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report

More information

DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75

DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75 DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared

More information

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0 EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305

More information

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,

More information

How To Protect Your Computer From Being Hacked

How To Protect Your Computer From Being Hacked Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications

More information

Mobile Billing System Security Target

Mobile Billing System Security Target Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing

More information

Intrusion Detection System Scanner Protection Profile

Intrusion Detection System Scanner Protection Profile Intrusion Detection System Scanner Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway

More information

Intrusion Detection System Sensor Protection Profile

Intrusion Detection System Sensor Protection Profile Intrusion Detection System Sensor Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway

More information

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle

More information

IMPP. Identity Management Protection Profile BSI-PP-0024

IMPP. Identity Management Protection Profile BSI-PP-0024 Identity Management Protection Profile IMPP BSI-PP-0024 Version Number 1.17 Date: January 12, 2006 Status: Final Author: David Ochel Owner: Brian Matthiesen Note: This document will become a public document

More information

IBM WebSphere Message Broker Security Target

IBM WebSphere Message Broker Security Target IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.

More information

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction

More information

Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target

Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target Version 1.7 January 2004 Document Control DOCUMENT TITLE Red Hat Enterprise Linux 3 Security Target Version

More information

Trust Technology Assessment Program. Validation Report

Trust Technology Assessment Program. Validation Report Trust Technology Assessment Program Validation Report U.S. Government Traffic Filter Firewall Protection Profile for Low-Risk Environments version 1.1 TTAP Report Number: TTAP-VR-0007 June, 1999 Mutual

More information

Cisco IronPort S-Series Web Security Appliance Security Target

Cisco IronPort S-Series Web Security Appliance Security Target Cisco IronPort S-Series Web Security Appliance Security Target Version 1.0 October 12, 2009 Prepared for: Cisco IronPort Systems 1100 Grundy Lane San Bruno, CA 94066 Prepared By: Science Applications International

More information

Top Layer Networks. Security Target V2.3

Top Layer Networks. Security Target V2.3 Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,

More information

Marimba Client and Server Management from BMC Software Release 6.0.3

Marimba Client and Server Management from BMC Software Release 6.0.3 Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...

More information

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012 Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa

More information

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Version: Status: Last Update: 1.19 Released 2014-03-05 Trademarks

More information

Intrusion Detection System System Protection Profile

Intrusion Detection System System Protection Profile Intrusion Detection System System Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway

More information

Security Target: Symantec Endpoint Protection Version 11.0

Security Target: Symantec Endpoint Protection Version 11.0 Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens

More information

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION

More information

TRUSTED SECURITY FILTER SECURITY TARGET

TRUSTED SECURITY FILTER SECURITY TARGET TRUSTED SECURITY FILTER SECURITY TARGET Edition: 4 29 Oct 07 Previous editions: Ed. 1 11 May 2006 Ed. 2 16 Aug 2006 Ed. 3 28 June 2007 Author: KKK Appr.: PÅT All pages in this document shall have the same

More information

Firewall Protection Profile V2.0 2008. 4. 24

Firewall Protection Profile V2.0 2008. 4. 24 Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This

More information

EAL4+ Security Target

EAL4+ Security Target EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft

More information

Check Point Endpoint Security Media Encryption Security Target

Check Point Endpoint Security Media Encryption Security Target Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation

More information

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx

More information

Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10

Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10 Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10 This document is a translation of the security target written in Japanese which has been evaluated and certified.

More information

Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)

Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley

More information

Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16

Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16 Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Gradkell Systems, Inc. DBsign for Client/Server Applications Version 3.0 Report Number: CCEVS-VR-05-0127

More information

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation

More information

Exchange Server 2003 Common Criteria Evaluation Security Target Exchange Server 2003 Team

Exchange Server 2003 Common Criteria Evaluation Security Target Exchange Server 2003 Team Exchange Server 2003 Common Criteria Evaluation Security Target Exchange Server 2003 Team Author: Michael Grimm Status: Final Version: 1.9 Revision: 1 Last Saved: 2005-06-21 File Name: MS_EX_ST_1.9.doc

More information

Security Target SQL Server 2012 Team

Security Target SQL Server 2012 Team Microsoft SQL Server 2012 Database Engine Common Criteria Evaluation (EAL2) Security Target SQL Server 2012 Team Author: Version: 1.2 Roger French (Microsoft Corporation) Date: 2012-08-07 Abstract This

More information

Security Target for BorderWare Firewall Server 6.5

Security Target for BorderWare Firewall Server 6.5 Security Target for BorderWare Firewall Server 6.5 Reference: ST January 2002 Version : 2.4 North America: Europe: 50 Burnhamthorpe Rd. W. 1 The Harlequin Centre Suite 502 Southall Lane Mississauga Southall

More information

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines

More information

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0. GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented

More information

Canon ir6570/ir5570 Series ir Security Kit-B3. Security Target

Canon ir6570/ir5570 Series ir Security Kit-B3. Security Target Document ID: CANON-Device05-001 Canon ir6570/ir5570 Series ir Security Kit-B3 Security Target This document is a translation of the security target written in Japanese, which has been evaluated and certified.

More information

Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013

Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013 Security Target Symantec TM Network Access Control Version 12.1.2 Document Version 0.12 February 14, 2013 Document Version 0.12 Symantec Page 1 of 39 Prepared For: Prepared By: Symantec Corporation 350

More information

JMCS Northern Light Video Conferencing System Security Target

JMCS Northern Light Video Conferencing System Security Target JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2

More information

SolarWinds Log and Event Manager Software Security Target

SolarWinds Log and Event Manager Software Security Target SolarWinds Log and Event Manager Software Security Target Version 1.5 August 25, 2014 SolarWinds Worldwide, LLC 3711 South MoPac Expressway Building Two Austin, Texas 78746 Copyright 2013 SolarWinds Worldwide,

More information

Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015

Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015 Security Target Securonix Security Intelligence Platform 4.0 Document Version 1.12 January 9, 2015 Document Version 1.12 Copyright Securonix Page 1 of 41 Prepared For: Prepared By: Securonix 5777 W. Century

More information

How To Evaluate A Security Target Of Evaluation (Toe)

How To Evaluate A Security Target Of Evaluation (Toe) Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Document Version 1.1

More information

U.S. Government Protection Profile for Database Management Systems

U.S. Government Protection Profile for Database Management Systems U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Natek Network Access Control (NAC)

Natek Network Access Control (NAC) Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History

More information

CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target

CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target Version 2.0 June Version 21, 2010 0.6 December 29, 2008 Prepared for: Prepared CA for: 100 Staples CA, Inc. Drive Framingham, 100

More information

EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.

EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0. EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,

More information

Exchange Server 2007 Common Criteria Evaluation

Exchange Server 2007 Common Criteria Evaluation Exchange Server 2007 Common Criteria Evaluation Security Target Exchange Server 2007 Team Author: Amy Blumenfield Version: 1.38 Date: 2009-09-28 File Name: MS_E12_ST_1.38.doc Abstract This document is

More information

Low Assurance Protection Profile for a VPN gateway

Low Assurance Protection Profile for a VPN gateway LAPP VPN gateway Low Assurance Protection Profile for a VPN gateway Version: 1.4 Date: 29/04/2005 Filename: lapp4_14 Product: VPN gateway Sponsor: SRC Security Research & Consulting GmbH, Graurheindorfer

More information

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,

More information

Symantec Security Information Manager Version 4.8.1

Symantec Security Information Manager Version 4.8.1 Security Target Symantec Security Information Manager Version 4.8.1 Document Version 1.7 January 30, 2014 Document Version 1.7 Copyright Symantec Corporation Page 1 of 42 Prepared For: Prepared By: Symantec

More information

Author: Roger French Version: 1.2 Date: 2009-01-23

Author: Roger French Version: 1.2 Date: 2009-01-23 Security Target SQL Server 2008 Team Author: Roger French Version: 1.2 Date: 2009-01-23 Abstract This document is the Security Target (ST) for the Common Criteria certification of the database engine of

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3) Report

More information

BMC ProactiveNet Performance Management 9.5. Security Target

BMC ProactiveNet Performance Management 9.5. Security Target BMC ProactiveNet Performance Management 9.5 Security Target Version 0.4 18 July 2014 Copyright 2014 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo are the exclusive

More information

Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness

Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness Version 1.22 Information Assurance Directorate National Security Agency 9800 Savage Road Fort George G.

More information

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN REF: 2010-12-INF-626 V1 Distribution: Public Date: 29.04.2011 Created: CERT3 Reviewed: TECNICO Approved: JEFEAREA CERTIFICATION REPORT FOR EADS GROUND SEGMENT SYSTEMS PROTECTION PROFILE (GSS-PP) ISSUE

More information

Enterasys Dragon-EAL Intrusion Defense System. Security Target

Enterasys Dragon-EAL Intrusion Defense System. Security Target Enterasys Dragon-EAL Intrusion Defense System Security Target Version 11 August 31, 2004 Enterasys Networks 50 Minuteman Road Andover Massachusetts 01810 www.enterasys.com Table of Contents 1. SECURITY

More information

Security Target. Security Target SQL Server 2008 Team. Author: Roger French Version: 1.04 Date: 2011-09-26

Security Target. Security Target SQL Server 2008 Team. Author: Roger French Version: 1.04 Date: 2011-09-26 SQL Server 2008 Team Author: Roger French Version: 1.04 Date: 2011-09-26 Abstract This document is the (ST) for the Common Criteria certification of the database engine of Microsoft SQL Server 2008 R2.

More information

Xceedium GateKeeper Version 5.2.1 Security Target

Xceedium GateKeeper Version 5.2.1 Security Target ceedium GateKeeper Version 521 Security Target February 3, 2011 Prepared for: ceedium, Inc 30 Montgomery Street Jersey City, NJ 07302 Prepared By: Science Applications International Corporation Common

More information

C038 Certification Report

C038 Certification Report C038 Certification Report TAXSAYA Online File name: Version: v1a Date of document: 15 August 2013 Document classification: For general inquiry about us or our services, please email: mycc@cybersecurity.my

More information

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 German Federal Office for Information Security PO Box 20 03 63 D-53133 Bonn Tel.:

More information

RSA, The Security Division of EMC RSA Access Manager v6.1. Security Target

RSA, The Security Division of EMC RSA Access Manager v6.1. Security Target RSA, The Security Division of EMC RSA Access Manager v6.1 Security Target Evaluation Assurance Level: EAL3+ Augmented with ALC_FLR.2 Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division

More information

Security Target for Citrix Presentation Server 4.0 For Windows

Security Target for Citrix Presentation Server 4.0 For Windows Security Target for Citrix Presentation Server 4.0 For Windows Reference: ST/T488 July 2005 Version: 1.0 This document has been prepared on behalf of: Prepared by: Citrix Systems, Inc BT 851 West Cypress

More information

Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1

Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1 Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:

More information

BMC Real End User Experience Monitoring and Analytics 2.5. Security Target

BMC Real End User Experience Monitoring and Analytics 2.5. Security Target BMC Real End User Experience Monitoring and Analytics 2.5 Security Target Version 0.07 5 March 2015 Copyright 2015 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo

More information

How To Manage Security In A Network Security System (Tsi)

How To Manage Security In A Network Security System (Tsi) SecureDoc Disk Encryption v4.3c Security Target for Common Criteria EAL-4 Abstract: This document represents Security Target Document for Secure Doc Disk Encryption product v4.3c. It specifies treats,

More information

Low Assurance Security Target for a Cisco VoIP Telephony System

Low Assurance Security Target for a Cisco VoIP Telephony System Low Assurance Security Target for a Cisco VoIP Telephony System Security Target Version 1.6 March 14, 2005 Document Control Preparation Action Name Date Prepared by: Rob Hunter of TNO-ITSEF BV on behalf

More information

WebSphere MQ EAL4 Security Target

WebSphere MQ EAL4 Security Target WebSphere MQ EAL4 Security Target Common Criteria Testing Laboratory 7125 Columbia Gateway Drive, Suite 300 Columbia, MD 21046 Date: 25 July 2006 Issue: 1.0 Reference: LFF/MQ/EAL4/ST/28 Copyright IBM 2006

More information

EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification

EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Doc Ref RD/JL/069 Replaces: N/A EXTOL epassport Suite v2.5 ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Extol Corporation (M) Sdn Bhd (121135-U) (643683-U) Extol Group www.extolcorp.com Unit G1,

More information

SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2

SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 Document No. 1769-000-D0007 Version: v0.89, 12 September 2013 Prepared for: Centrify Corporation 785 N. Mary Avenue, Suite 200 Sunnyvale, California USA,

More information

AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10

AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10 AppGate Security Server, Version 8.0.4 Security Target Document Version: 2.9 Date: 2008-04-10 Contents 1 INTRODUCTION...6 1.1 ST Identification...6 1.2 ST Overview...6 1.3 CC Conformance Claim...6 1.4

More information

Joint Interpretation Library. Guidance for Smartcard evaluation

Joint Interpretation Library. Guidance for Smartcard evaluation Joint Interpretation Library Guidance for Smartcard evaluation Version 1.1 March 2002 Joint Interpretation Library Guidance for smartcard evaluation Table of Contents 1. Objective... 5 2. Smartcard product

More information

Low Assurance Protection Profile for a VoIP Infrastructure

Low Assurance Protection Profile for a VoIP Infrastructure Low Assurance Protection Profile for a VoIP Infrastructure Version 1.1 Date Author(s) Dirk-Jan Out Certification ID Sponsor File name No of pages 12 TNO-ITSEF BV VoIP Low Assurance Protection Profile 1.1

More information

Forefront Identity Manager (FIM) 2010

Forefront Identity Manager (FIM) 2010 Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.

More information

Trustwave DbProtect Version 6.4.3 Security Target

Trustwave DbProtect Version 6.4.3 Security Target Trustwave DbProtect Version 6.4.3 Security Target Version 1.8 July 21, 2015 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane

More information

Trustwave Secure Web Gateway Security Target

Trustwave Secure Web Gateway Security Target Trustwave Secure Web Gateway Security Target Version 1.5 September 18, 2013 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane

More information

Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target

Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Evaluation Assurance Level: EAL2 augmented with ALC_FLR.2 Document Version: 1 Prepared for: Prepared by: Citrix

More information

Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0

Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0 Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX

More information

Commercial Database Management System Protection Profile (C.DBMS PP)

Commercial Database Management System Protection Profile (C.DBMS PP) Common Commercial Database Management System (C.DBMS PP) March 1998 Common Commercial Database Management System March 1998 Page ii Contents March 1998 1 Introduction... 1 1.1 Identification of... 1 1.2

More information

Network Intrusion Prevention System Protection Profile V1.1

Network Intrusion Prevention System Protection Profile V1.1 Network Intrusion Prevention System Protection Profile V1.1 December 21, 2005 (This page left blank on purpose for double-side printing) Protection Profile Title Network Intrusion Prevention System Protection

More information

F5 Networks FirePass 4100 Version 5.5.2 Security Target EAL 2 + ALC_FLR.1, ADV_SPM.1

F5 Networks FirePass 4100 Version 5.5.2 Security Target EAL 2 + ALC_FLR.1, ADV_SPM.1 F5 Networks FirePass 4100 Version 5.5.2 Security Target EAL 2 + ALC_FLR.1, ADV_SPM.1 Release Date: December 19, 2007 Document ID: Version: 1.3 06-1023-R-0018 Prepared By: InfoGard Laboratories, Inc. Prepared

More information

Common Criteria Evaluation for a Trusted Entrust/PKI

Common Criteria Evaluation for a Trusted Entrust/PKI Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: 2.0 2000, Entrust, Inc. Entrust is a registered trademark of Entrust Technologies Inc. in the United

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2

SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2 SenSage, Inc. SenSage 4.6.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.2 Prepared for: Prepared by: SenSage, Inc. 55 Hawthorne Street San Francisco, CA 94105 United States of

More information

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target RSA, The Security Division of EMC envision platform v4.0 SP 1 Security Target Evaluation Assurance Level: 3+ Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division of EMC 174 Middlesex

More information

Check Point Endpoint Security Full Disk Encryption Security Target

Check Point Endpoint Security Full Disk Encryption Security Target Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel

More information

SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1

SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1 SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1 Document No. 1517-011-D001 Version 1.1, 3 August 2006 Prepared for: Citadel Security Software Inc. Two Lincoln Centre

More information

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H

More information

Firewall Protection Profile

Firewall Protection Profile samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 ronny.janse@msb.se Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...

More information

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...

More information

Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012

Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012 Security Target Symantec Data Loss Prevention 11.1.1 Document Version 1.0 January 23, 2012 Document Version 1.0 Symantec Corporation Page 1 of 40 Prepared For: Prepared By: Symantec Corporation 350 Ellis

More information

KYOCERA MITA. Data Security Kit (B), Overseas Security Target, Version 0.15

KYOCERA MITA. Data Security Kit (B), Overseas Security Target, Version 0.15 KYOCERA MITA Data Security Kit (B), Overseas Security Target, Version 0.15 This document is a translation of the security target written in Japanese, which has been evaluated and certified. The Japan Certification

More information

Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target

Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target Version 1.8 April 18, 2011 Wyse Technology Inc. 3471 N. First Street San Jose, CA 95134 DOCUMENT INTRODUCTION Prepared

More information

Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100. Security Target

Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100. Security Target Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100 Security Target Evaluation Assurance Level: EAL 2+ Document Version: 0.7 Prepared for: Prepared by: Blue Coat Systems, Inc.

More information

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT REF: 2010-15-INF-681 v1 Difusión: Expediente Fecha: 05.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-15 Datos del solicitante: 440301192W HUAWEI References:

More information

Tivoli Security Policy Manager Version 7.1 Security Target

Tivoli Security Policy Manager Version 7.1 Security Target Tivoli Security Policy Manager Version 7.1 Security Target Document Version Version: 1.24 2013-10-31 Page 1 of 56 Trademarks IBM and the IBM logo are trademarks or registered trademarks of International

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Report Number: CCEVS-VR-VID10257-2011 Dated: 31 March 2011 Version: 1.0 National Institute

More information

Secuware Virtual System (SVS)

Secuware Virtual System (SVS) Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express

More information